-
Notifications
You must be signed in to change notification settings - Fork 0
fix: Main merge master bug cypress app non deploy key googleapis #41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com>
Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com>
* Create SECURITY.md Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com> * Update SECURITY.md Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com> Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com> --------- Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com> Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
* Summary by Sourcery Add a new GitHub Actions workflow to build and deploy static content to GitHub Pages. CI: Create .github/workflows/static.yml to trigger deployments on pushes to main and manual dispatch Configure permissions for GITHUB_TOKEN and set concurrency to avoid canceling in-progress runs Define a deploy job that checks out the repo, configures Pages, uploads the site artifact, and deploys to GitHub Pages Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com>
…scripting (#39) Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com> Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Reviewer's GuideThis PR corrects a redirect path calculation in the frontend utilities and adds a comprehensive suite of CI/CD configurations (GitHub Actions and CircleCI) alongside a security policy document. Sequence diagram for corrected demo redirect logic in frontendsequenceDiagram
participant "User (browser)" as User
participant "handleDemoRedirect()" as HandleDemoRedirect
participant "window.location" as WindowLocation
User->>HandleDemoRedirect: Navigates to demo route
HandleDemoRedirect->>HandleDemoRedirect: Calculate current and next path
HandleDemoRedirect->>WindowLocation: setTimeout (15s) to redirect to `${path[index]}?next=${nextPath}`
WindowLocation->>User: Browser navigates to new path
File-Level Changes
Possibly linked issues
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
Summary of ChangesHello @Dargon789, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request primarily focuses on enhancing the project's infrastructure by adding new CircleCI configurations for continuous integration, including a specific setup for Rust-based components and a general-purpose workflow. Additionally, it introduces a formal Highlights
Ignored Files
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
…n permissions Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com> Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request introduces several new CircleCI configuration files and a SECURITY.md policy, alongside a minor change in a TypeScript utility file. My review focuses on improving the new CI configurations by removing redundancy and placeholder content. Specifically, I've pointed out duplicated steps in the Rust CI workflow, and hardcoded/placeholder content in another CI file. I've also suggested updating the new security policy with accurate information.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey there - I've reviewed your changes - here's some feedback:
- Several GitHub Actions workflows seem to overlap (e.g., two Jekyll/Pages workflows and static deploy); consider consolidating or clarifying their distinct purposes to reduce maintenance overhead.
- Multiple workflows include TODO placeholders for critical environment variables (e.g., PROJECT_ID, OCTOPUS_URL); ensure these are parameterized via secrets or updated to real values before merging.
- The CircleCI cargo job repeats formatting and testing steps twice; removing duplicate runs will streamline the CI process.
Prompt for AI Agents
Please address the comments from this code review:
## Overall Comments
- Several GitHub Actions workflows seem to overlap (e.g., two Jekyll/Pages workflows and static deploy); consider consolidating or clarifying their distinct purposes to reduce maintenance overhead.
- Multiple workflows include TODO placeholders for critical environment variables (e.g., PROJECT_ID, OCTOPUS_URL); ensure these are parameterized via secrets or updated to real values before merging.
- The CircleCI cargo job repeats formatting and testing steps twice; removing duplicate runs will streamline the CI process.
## Individual Comments
### Comment 1
<location> `.github/workflows/google.yml:104-106` </location>
<code_context>
+ docker push "${DOCKER_TAG}"
+
+ # Set up kustomize
+ - name: 'Set up Kustomize'
+ run: |-
+ curl -sfLo kustomize https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2Fv5.4.3/kustomize_v5.4.3_linux_amd64.tar.gz
+ chmod u+x ./kustomize
+
</code_context>
<issue_to_address>
**issue (bug_risk):** The Kustomize download command fetches a tar.gz but does not extract it.
Since the downloaded file is a tar.gz archive, extracting it is necessary to access the kustomize binary and prevent runtime issues.
</issue_to_address>
### Comment 2
<location> `.github/workflows/google.yml:113` </location>
<code_context>
+ - name: 'Deploy to GKE'
+ run: |-
+ # replacing the image name in the k8s template
+ ./kustomize edit set image LOCATION-docker.pkg.dev/PROJECT_ID/REPOSITORY/IMAGE:TAG=$GAR_LOCATION-docker.pkg.dev/$PROJECT_ID/$REPOSITORY/$IMAGE:$GITHUB_SHA
+ ./kustomize build . | kubectl apply -f -
+ kubectl rollout status deployment/$DEPLOYMENT_NAME
</code_context>
<issue_to_address>
**issue (bug_risk):** Hardcoded placeholders in the kustomize image set command may cause deployment issues.
Placeholders such as LOCATION, PROJECT_ID, REPOSITORY, IMAGE, and TAG may not be resolved automatically. Use environment variables or explicit values to avoid incorrect image references during deployment.
</issue_to_address>
### Comment 3
<location> `.github/workflows/octopusdeploy.yml:63-68` </location>
<code_context>
+ username: ${{ env.DOCKER_REGISTRY_USERNAME }}
+ password: ${{ env.DOCKER_REGISTRY_PASSWORD }}
+
+ - name: Extract metadata (tags, labels) for Docker
+ id: meta
+ uses: docker/metadata-action@9ec57ed1fcdbf14dcef7dfbe97b2010124a938b7
+ with:
+ images: ${{ env.DOCKER_REGISTRY }}/${{ github.repository }}
+ tags: type=semver,pattern={{version}},value=v1.0.0-{{sha}}
+
+ - name: Build and push Docker image
</code_context>
<issue_to_address>
**suggestion:** The Docker image tag pattern is hardcoded to v1.0.0-{{sha}}, which may not reflect actual versioning.
A static tag can cause image overwrites and versioning confusion. Please use dynamic tags derived from release or commit data.
```suggestion
- name: Extract metadata (tags, labels) for Docker
id: meta
uses: docker/metadata-action@9ec57ed1fcdbf14dcef7dfbe97b2010124a938b7
with:
images: ${{ env.DOCKER_REGISTRY }}/${{ github.repository }}
tags: |
type=ref,event=tag
type=sha,format=short
type=raw,value=latest,enable={{is_default_branch}}
```
</issue_to_address>
### Comment 4
<location> `.circleci/cargo.yml:13-15` </location>
<code_context>
+ keys:
+ - v1-cargo-{{ checksum "Cargo.lock" }}
+ - v1-cargo-
+ - run:
+ name: "Check formatting"
+ command: cargo fmt -- --check
+ - run:
+ name: "Run tests"
</code_context>
<issue_to_address>
**suggestion:** Duplicate formatting and test steps may be redundant.
The workflow executes 'cargo fmt -- --check' and 'cargo test' twice; removing the duplicates will simplify the workflow.
Suggested implementation:
```
- run:
name: "Check formatting"
command: cargo fmt -- --check
- run:
name: "Run tests"
command: cargo test
```
```
- save_cache:
key: v1-cargo-{{ checksum "Cargo.lock" }}
paths:
- "~/.cargo/bin"
- "~/.cargo/registry/index"
- "~/.cargo/registry/cache"
- "~/.cargo/git/db"
- "target"
```
If there are additional duplicate 'cargo fmt -- --check' or 'cargo test' steps elsewhere in the file, please remove those as well to ensure each is only run once per job.
</issue_to_address>
### Comment 5
<location> `.circleci/web3_defi_gamefi.yml:20-21` </location>
<code_context>
+ executor: my-custom-executor
+ steps:
+ - checkout
+ - run: |
+ # echo Hello, World!
+
+workflows:
</code_context>
<issue_to_address>
**suggestion:** The run step is currently commented out and does not perform any action.
Please clarify the purpose of this step and either implement the required commands or remove it if unnecessary.
```suggestion
- run: |
echo "CircleCI job started in working directory: $(pwd)"
```
</issue_to_address>Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
Co-authored-by: sourcery-ai[bot] <58596630+sourcery-ai[bot]@users.noreply.github.com> Signed-off-by: AU_gdev_19 <64915515+Dargon789@users.noreply.github.com>
Summary by Sourcery
Fix demo redirect logic and introduce a suite of CI/CD configurations, including GitHub Actions workflows for Google Cloud, Octopus Deploy, GitHub Pages, CircleCI pipelines, and add a security policy
Bug Fixes:
CI:
Documentation: